Escolar Documentos
Profissional Documentos
Cultura Documentos
Rev: 3.1.0
1910010661
is a registered trademark of
TP-LINK TECHNOLOGIES CO., LTD. Other brands and product names are trademarks or
registered trademarks of their respective holders.
No part of the specifications may be reproduced in any form or by any means or used to make
any derivative such as translation, transformation, or adaptation without permission from
TP-LINK TECHNOLOGIES CO., LTD. Copyright 2012 TP-LINK TECHNOLOGIES CO., LTD.
All rights reserved.
http://www.tp-link.com
FCC STATEMENT
This equipment has been tested and found to comply with the limits for a Class B digital device,
pursuant to part 15 of the FCC Rules. These limits are designed to provide reasonable
protection against harmful interference in a residential installation. This equipment generates,
uses and can radiate radio frequency energy and, if not installed and used in accordance with
the instructions, may cause harmful interference to radio communications. However, there is no
guarantee that interference will not occur in a particular installation. If this equipment does
cause harmful interference to radio or television reception, which can be determined by turning
the equipment off and on, the user is encouraged to try to correct the interference by one or
more of the following measures:
Connect the equipment into an outlet on a circuit different from that to which the
receiver is connected.
This device complies with part 15 of the FCC Rules. Operation is subject to the following two
conditions:
1) This device may not cause harmful interference.
2) This device must accept any interference received, including interference that may cause
undesired operation.
Any changes or modifications not expressly approved by the party responsible for compliance
could void the users authority to operate the equipment.
Note: The manufacturer is not responsible for any radio or TV interference caused by
unauthorized modifications to this equipment. Such modifications could void the users authority
to operate the equipment.
CE Mark Warning
This is a class B product. In a domestic environment, this product may cause radio interference,
in which case the user may be required to take adequate measures.
National Restrictions
This device is intended for home and office use in all EU countries (and other countries
following the EU directive 1999/5/EC) without any limitation except for the countries mentioned
below:
Country
Restriction
Bulgaria
None
Outdoor use limited to 10
France
Italy
None
Luxembourg
None
Reason/remark
General authorization required for outdoor use
and public service
Military Radiolocation use. Refarming of the 2.4
GHz band has been ongoing in recent years to
allow
current
relaxed
regulation.
Full
Norway
Implemented
Russian
Federation
None
environment. This equipment should be installed and operated with minimum distance 20cm
between the radiator & your body.
Ce dispositif est conforme la norme CNR-210 dIndustrie Canada applicable aux appareils
radio exempts de licence. Son fonctionnement est sujet aux deux conditions suivantes:
(1) Le dispositif ne doit pas produire de brouillage prjudiciable, et
(2) Ce dispositif doit accepter tout brouillage reu,y compris un brouillage susceptible de
provoquer un fonctionnement indsirable.
NOTE IMPORTANTE:
Dclaration dexposition aux radiations:
Cet quipement est conforme aux limites dexposition aux rayonnements IC tablies pour un
environnement non contrl. Cet quipement doit tre install et utilis avec un minimum de 20
cm de distance entre la source de rayonnement et votre corps.
NCC Notice:
,
.
DECLARATION OF CONFORMITY
For the following equipment:
Product Description: 150Mbps Wireless N USB Adapter
Model No.: TL-WN727N
Trademark: TP-LINK
We declare under our own responsibility that the above products satisfy all the technical
regulations applicable to the product within the scope of Council Directives:
Directives 1999/5/EC, Directives 2006/95/EC, Directives1999/519/EC, Directives 2011/65/EU
The above product is in conformity with the following standards or other normative documents:
ETSI EN 300 328 V1.7.1: 2006
ETSI EN 301 489-1 V1.8.1:2008 & ETSI EN 301 489-17 V2.1.1:2009
EN60950-1:2006+A112009+A1:2010+A12:2011
EN62311:2008
Yang Hongliang
Product Manager of International Business
CONTENTS
Package Contents .................................................................................................... 1
Chapter 1 Product Overview ................................................................................. 2
1.1 Introduction ............................................................................................................. 2
1.2 Features .................................................................................................................. 2
1.3 Hardware Overview................................................................................................. 3
Chapter 2 Installation............................................................................................. 4
2.1 Hardware Installation .............................................................................................. 4
2.2 Software Installation................................................................................................ 4
3.2.2
In Windows 7............................................................................................ 16
3.3.2
In Windows Vista...................................................................................... 17
3.3.3
In Windows XP ......................................................................................... 19
4.1.2
4.1.3
Appendix A: Specifications................................................................................... 31
Appendix B: Glossary............................................................................................ 32
TL-WN727N
Package Contents
Please verify that all the package contents below are available.
Make sure that the above items are contained in the package. If any of the above items are
damaged or missing, please contact your distributor.
) Note:
The adapter mentioned in this User Guide stands for TL-WN727N 150Mbps Wireless N USB
Adapter without any explanations.
TL-WN727N
Introduction
The adapter is a 802.11n client device designed to deliver a high-speed and unrivaled wireless
performance for your desktop. With a faster wireless connection, you can get a better Internet
experience, such as downloading, gaming, video streaming.
With the 802.11n technology, the TL-WN727Ns auto-sensing capability allows high packet
transfer rate of up to 150Mbps for maximum throughput. It has good capability on anti-jamming,
and it can also interoperate with other wireless (802.11b/g) products. The adapter supports WEP,
WPA and WPA2 encryption to prevent outside intrusion and protect your personal information
from being exposed.
The adapter is easy to install and manage with the Quick Setup Wizard guiding you step-by-step
through the installation process and the TP-LINK Wireless Configuration Utility instructing you to
quickly set up a wireless connection.
With unmatched wireless performance, reception, and security protection, the TL-WN727N is the
best choice for easily adding or upgrading wireless connectivity to your desktop.
1.2
Features
Supports roaming between access points when configured under Infrastructure mode
TL-WN727N
1.3
Hardware Overview
LED status:
Status
Off
Working Status
The driver has not been installed;
The adapter's radio has been disabled.
Flashing Slowly
Flashing Quickly
TL-WN727N
Chapter 2 Installation
2.1
Hardware Installation
) Note:
The promoted Found New Hardware Wizard screen will pop up when the adapter is installed
correctly. Click Cancel.
2.2
Software Installation
The adapters Setup Wizard will guide you through the installation procedures for Windows 7,
Windows Vista, and Windows XP. The procedures in different systems are quite similar,
therefore here takes the procedures in Windows 7 for example.
1.
Insert the Resource CD into your CD-ROM drive, and the window below will appear. Select
model TL-WN727N. There will be a menu including: Install Driver&Utility and User
Guide.
2.
Figure 2-1
Click Install Driver&Utility to load the following screen.
Figure 2-2
TL-WN727N
3.
Soon, the figure below will play after a moment. Click Next to continue.
Figure 2-3
4.
Figure 2-4
TL-WN727N
5.
Click Change to specify the destination location for the software or you can leave it
default. Click Next in the screen below to continue.
Figure 2-5
6.
Figure 2-6
TL-WN727N
7.
The utility and drivers will install. This may take 1~2 minutes.
Figure 2-7
8.
After all the steps above, you will see the screen below. Click Finish to complete the setup.
Figure 2-8
TL-WN727N
9.
After installation, the utility configuration page will automatically pop up as shown in the
following figure and the icon
Figure 2-9
TL-WN727N
Method One:
Method Two:
3.1
1.
Figure 3-1
2.
The Network page will display all wireless networks that are available in your area. To
connect to a network, simply highlight the wireless network name and click Connect.
SSID (Service Set Identifier) is the name of the wireless network. The adapter will
TL-WN727N
automatically connect to your target network next time if you tick Connect automatically.
Figure 3-2
3.
If word None appears behind the SSID, this means the network to be connected is not
security-enabled and you can connect to the network without entering a key. To prevent
outside intrusion and safeguard your network, it is strongly recommended to set a
password to your router or access point.
Figure 3-3
If there is a lock icon behind the SSID, this means the wireless network is secure and the
corresponding security type will display. You must know the encryption key/security
settings to connect.
Input the password which can be found on the configuration page of your router or access
point, then click OK to continue. Or push the QSS/WPS button on your router if your router
features the QSS/WPS function to quickly build a connection without having to enter a key.
10
TL-WN727N
Figure 3-4
4.
You have now successfully connected to your network. Click Close to enjoy the Internet.
Figure 3-5
5.
To view more information about the network currently connected, click Status in the tools
section and the page will display information such as the network type, link quality and
wireless mode.
Figure 3-6
11
TL-WN727N
3.2
WPS (Wi-Fi Protected Setup) function allows you to add a new wireless device to an existing
network quickly.
If the wireless router supports QSS or WPS, you can establish a wireless connection between
wireless card and router using either Push Button Configuration (PBC) method or PIN method.
Three WPS connection methods are listed in the following parts while the third method is only
supported in Windows XP and Windows Vista.
Press the QSS (also called WPS) button on the back panel of the router. Here takes router
TL-WR741ND for example.
2.
Or open TWCU and click WPS tab. Select Push the button on my access point or
wireless router and then click Connect.
12
TL-WN727N
Figure 3-7
3.
Figure 3-8
4.
When the following window appears, you have successfully connected to the network.
Figure 3-9
2)
13
TL-WN727N
Open TWCU and click WPS tab. Select Enter the PIN of my access point or wireless
router. In the empty field beside PIN, enter the PIN labeled on the bottom of the router
(here takes 13492564 for example). If you have generated a new PIN code for your router,
please enter the new one instead. Click Connect to continue.
Figure 3-10
2.
Figure 3-11
3.
When Figure 3-9 appears, you have successfully connected to the network.
Open TWCU and click WPS tab. Select Enter the PIN of this device into my access
point or wireless router. In the field beside PIN, you will see the PIN value of the adapter
which is randomly generated. Click Connect to continue.
14
TL-WN727N
Figure 3-12
2.
Open your routers Web-based Utility and click QSS link on the left of the main menu. Then
click Add device and the following figure will appear. Enter the PIN value of the adapter in
the empty field beside PIN and then click Connect.
Figure 3-13
3.
When Connect successfully appears on the screen, the WPS configuration is complete.
Or you can view the adapters utility page to see whether the connection has been
successful as shown in Figure 3-15.
Figure 3-14
15
TL-WN727N
Figure 3-15
3.3
3.3.1 In Windows 7
Windows 7 users may use the built-in wireless utility. Follow the steps below.
1.
display any available wireless networks in your area. Highlight the wireless network
(displayed using the SSID) to be connected and then click Connect.
Figure 3-16
2.
If the network you would like to connect is security-enabled, enter the same security key or
passphrase that is on your router. Or push the WPS button (also called QSS) on the router
or access point (You will be prompted to push the button on the window if WPS/QSS
16
TL-WN727N
function is supported as shown in the figure below). If the network to be connected is not
secure, the connection will be built without entering a key.
Figure 3-17
3.
Figure 3-18
Open the wireless utility by right-clicking on the wireless computer icon in your system tray
as shown in the figure below. Select Connect to a network.
17
TL-WN727N
Figure 3-19
2.
The utility will display any available wireless networks in your area. Highlight the wireless
network you would like to connect and then click Connect.
Figure 3-20
3.
If the network you would like to connect is security-enabled, enter the same security key or
passphrase that is on your router. If the network to be connected is not secure, the
connection will be built without entering a key.
Figure 3-21
4.
18
TL-WN727N
Figure 3-22
3.3.3 In Windows XP
Windows XP users may use the built-in wireless utility. Follow the steps below.
1.
Right-click on the utility icon in your system tray (lower-right corner). Select Switch to
TP-LINK Wireless configuration Utility.
Figure 3-23
Or double-click the utility icon to load the utility configuration page. Click Advanced in the
tools section and then select Use Windows wireless configuration tool in the figure
shown below. Click OK when Figure 3-25 appears to continue.
19
TL-WN727N
Figure 3-24
Figure 3-25
2.
Right-click on the wireless computer icon in your system tray (lower-right corner). Select
View Available Wireless Networks.
Figure 3-26
3.
The utility will display any available wireless networks in your area. Click on a network
(displayed using the SSID) and click the Connect button.
20
TL-WN727N
Figure 3-27
4.
If the network is security-enabled, you will be prompted to enter the key as shown below. If
not, you will connect to the network directly without entering a key.
Figure 3-28
21
TL-WN727N
Chapter 4 Management
This section will show you how to configure your TL-WN727N adapter using the TP-LINK
Wireless Configuration Utility (TWCU).
The TL-WN727N adapter uses the TP-LINK Wireless Configuration Utility as the management
software. The utility provides users with an easy interface to change any settings related to the
adapter. Double-clicking on the
4.1
Profile
Your wireless networks may vary in different places like home, office or coffee shop. With
Profile management, you can easily save and manage various networks to be connected,
saving you the trouble of having to repeat the same configurations. Click Profile in the tools
section, the following page will appear.
Figure 4-1
22
TL-WN727N
Figure 4-2
The following items can be found on the screen.
Profile Name: Enter a name for your profile (e.g. Home, Office, CoffeeShop). The same
name is not allowed. Please also note that no space is allowed between words.
Network Type: Select the network type. If you are connecting to a wireless router or
access point, select Infrastructure. If you are connecting to another wireless client such as
an adapter, select ad-hoc.
Security Type: Select the security type from the list. Four options are available:
WPA/WPA2, WPA-PSK/WPA2-PSK, WEP and None. The security type should be the
same as on your router or access point, otherwise, you will not be able to build a successful
connection.
WPA-PSK/WPA2-PSK uses a passphrase or key to authenticate your wireless connection.
The key must be the exact same key entered on your wireless router or access point. None
stands for no security. It is recommended to enable WPA-PSK/WPA2-PSK on your
wireless router or access point before configuring your wireless adapter.
Encryption Type: From the drop-down menu, select the encryption type that is the same
as on your router or access point.
Security Key: Enter the passphrase exactly as it is on your wireless router or access point.
Click the Show characters box to see the passphrase. Unchecking it will hide it.
Start this connection automatically: check this box to automatically connect to this
network next time.
Complete the above settings, the Profile page should look like the following figure. To connect
to a desired network, just highlight the network you would like to connect to and click the
Connect button on the bottom of the window.
23
TL-WN727N
Figure 4-3
Figure 4-4
24
TL-WN727N
Figure 4-5
4.2
Advanced
2)
3)
4)
Figure 4-6
4.3
About
The About screen gives you information about the Driver and Utility versions of the adapter.
Right-click on the
icon in your system tray and select About from the list.
25
TL-WN727N
Figure 4-7
26
TL-WN727N
Chapter 5 AP Mode
In Soft AP mode, the adapter will work as an AP.
Suppose that only one computer in your house can access the Internet for various reasons like
only one WLAN port is available on your wired broadband router, however, other
wireless-capable devices also want to share the Internet. Then the adapter can be configured
as an AP under the Soft AP mode, saving you the trouble of having to get a separate access
point or a router.
With this feature, a computer can use a single physical wireless adapter to connect as a client
to a hardware access point while at the same time acting as a software AP allowing other
wireless-capable devices to connect to it.
To switch to this mode, right-click on the utility icon in your system tray and select Switch to
SoftAP mode.
Figure 5-1
Or from the Advanced page of the utility, tick ON under the SoftAP mode as shown in the
following figure. Click OK when prompted to confirm the setting.
Figure 5-2
The Soft AP icon should then appear beside Advanced icon in the utility.
27
TL-WN727N
Figure 5-3
SSID: Enter the name for your soft AP (for example, Jone) so that others can know which
AP is yours when trying to connect to it. The default name (SSID) is SoftAP.
Security Type: The security type here is set to be WPA2-PSK which is based on 802.11i
and uses Advanced Encryption Standard instead of TKIP. It was designed to improve the
security features of WEP. WPA2-PSK uses a passphrase or key to authenticate your
wireless connection. You neednt make any configuration here.
Security Key: Enter the Key in the field to make your AP security enabled. It is
recommended that you specify another key instead of the default key 12345678. Only by
entering the corresponding key can other computers establish a successful connection with
your AP.
28
TL-WN727N
2.
Figure 6-2
29
TL-WN727N
6.2
1.
Click Uninstall shown in above Figure 6-3, the system will uninstall the driver software of
the adapter from your PC.
30
TL-WN727N
Appendix A: Specifications
Normal
Interface
Standards
Operating System
Throughput
150Mbps (Maximal)
11b: 1/2/5.5/11Mbps
11g: 6/9/12/18/24/36/48/54Mbps
11n: Up to 150Mbps
11b:CCK,QPSK,BPSK
Modulation
11g:OFDM
11n: QPSK, BPSK, 16-QAM, 64-QAM
Data Security
Frequency*
2.4 ~ 2.4835GHz
Spread Spectrum
FCC, CE
0~40 (32~104)
Working Humidity
Storage Temperature
-40~70(-40~158)
Storage Humidity
* Only 2.412GHz~2.462GHz is allowed to be used in USA, which means only channel 1~11 is
available for American users to choose.
31
TL-WN727N
Appendix B: Glossary
802.11b - The 802.11b standard specifies a wireless product networking at 11 Mbps using
direct-sequence spread-spectrum (DSSS) technology and operating in the unlicensed radio
spectrum at 2.4GHz, and WEP encryption for security. 802.11b networks are also referred to
as Wi-Fi networks.
802.11n - 802.11n builds upon previous 802.11 standards by adding MIMO (multiple-input
multiple-output). MIMO uses multiple transmitter and receiver antennas to allow for increased
data throughput via spatial multiplexing and increased range by exploiting the spatial diversity,
perhaps through coding schemes like Alamouti coding. The Enhanced Wireless Consortium
(EWC) was formed to help accelerate the IEEE 802.11n development process and promote a
technology specification for interoperability of next-generation wireless local area networking
(WLAN) products.
3
Ad hoc Network - An ad hoc network is a group of computers, each with a Wireless Adapter,
connected as an independent 802.11 wireless LAN. Ad hoc wireless computers operate on a
peer-to-peer basis, communicating directly with each other without the use of an access point.
Ad hoc mode is also referred to as an Independent Basic Service Set (IBSS) or as
peer-to-peer mode, and is useful at a departmental scale or SOHO operation.
DSSS - (Direct-Sequence Spread Spectrum) - DSSS generates a redundant bit pattern for all
data transmitted. This bit pattern is called a chip (or chipping code). Even if one or more bits
in the chip are damaged during transmission, statistical techniques embedded in the receiver
can recover the original data without the need of retransmission. To an unintended receiver,
DSSS appears as low power wideband noise and is rejected (ignored) by most narrowband
receivers. However, to an intended receiver (i.e. another wireless LAN endpoint), the DSSS
signal is recognized as the only valid signal, and interference is inherently rejected (ignored).
FHSS - (Frequency Hopping Spread Spectrum) - FHSS continuously changes (hops) the
carrier frequency of a conventional carrier several times per second according to a
pseudo-random set of channels. Because a fixed frequency is not used, and only the
transmitter and receiver know the hop patterns, interception of FHSS is extremely difficult.
32
TL-WN727N
WEP - (Wired Equivalent Privacy) - A data privacy mechanism based on a 64-bit or 128-bit or
152-bit shared key algorithm, as described in the IEEE 802.11 standard. To gain access to a
WEP network, you must know the key. The key is a string of characters that you create.
When using WEP, you must determine the level of encryption. The type of encryption
determines the key length. 128-bit encryption requires a longer key than 64-bit encryption.
Keys are defined by entering in a string in HEX (hexadecimal - using characters 0-9, A-F) or
ASCII (American Standard Code for Information Interchange alphanumeric characters)
format. ASCII format is provided so you can enter a string that is easier to remember. The
ASCII string is converted to HEX for use over the network. Four keys can be defined so that
you can change keys easily.
Wi-Fi - A trademark of the Wi-Fi Alliance and the brand name for products using the IEEE
802.11 family of standards.
WLAN - (Wireless Local Area Network) - A group of computers and associated devices
communicate with each other wirelessly, which network serving users are limited in a local
area.
WPA - (Wi-Fi Protected Access) - A wireless security protocol uses TKIP (Temporal Key
Integrity Protocol) encryption, which can be used in conjunction with a RADIUS server.
33